Sciweavers

1625 search results - page 154 / 325
» Privacy-preserving data publishing
Sort
View
JDCTA
2008
535views more  JDCTA 2008»
15 years 4 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
PR
2006
132views more  PR 2006»
15 years 4 months ago
Some approaches to improve tree-based nearest neighbour search algorithms
Nearest neighbour search is a widely used technique in pattern recognition. During the last three decades a large number of fast algorithms have been proposed. In this work we are...
Eva Gómez-Ballester, Luisa Micó, Jos...
CJ
1999
95views more  CJ 1999»
15 years 4 months ago
Two Kinds of Probabilistic Induction
Problems in probabilistic induction are of two general kinds. In the first, we have a linearly ordered sequence of symbols that must be extrapolated. In the second we want to extr...
Ray J. Solomonoff
JSS
2002
88views more  JSS 2002»
15 years 4 months ago
Software project management audits - update and experience report
This paper describes software project management audits as they have been defined in the literature. It outlines the motivation for conducting such audits routinely, which differs...
James McDonald
NAR
1998
76views more  NAR 1998»
15 years 4 months ago
The Database of Ribosomal Cross links (DRC)
The Database of Ribosomal Cross-links (DRC) provides a complete collection of all the published data produced by cross-linking studies on the Escherichia coli ribosome, as well as...
Pavel V. Baranov, Petr V. Sergiev, Olga A. Dontsov...